You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_iam_policy_document.additional_inline](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
161
+
|[aws_iam_policy_document.assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
162
+
|[aws_iam_policy_document.service](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
163
+
|[aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region)| data source |
155
164
156
165
## Inputs
157
166
158
167
| Name | Description | Type | Default | Required |
| attach\_policies | Controls whether list of policies should be added to IAM role |`bool`|`false`| no |
161
-
| attach\_policies\_for\_integrations | Whether to attach AWS Service policies to IAM role |`bool`|`true`| no |
162
-
| attach\_policy | Controls whether policy should be added to IAM role |`bool`|`false`| no |
163
-
| attach\_policy\_json | Controls whether policy\_json should be added to IAM role |`bool`|`false`| no |
164
-
| attach\_policy\_jsons | Controls whether policy\_jsons should be added to IAM role |`bool`|`false`| no |
165
-
| attach\_policy\_statements | Controls whether policy\_statements should be added to IAM role |`bool`|`false`| no |
166
-
| aws\_region\_assume\_role | Name of AWS regions where IAM role can be assumed by the Step Function |`string`|`""`| no |
167
-
| create | Whether to create Step Function resource |`bool`|`true`| no |
168
-
| create\_role | Whether to create IAM role for the Step Function |`bool`|`true`| no |
169
-
| definition | The Amazon States Language definition of the Step Function |`string`|`""`| no |
170
-
| name | The name of the Step Function |`string`|`""`| no |
171
-
| number\_of\_policies | Number of policies to attach to IAM role |`number`|`0`| no |
172
-
| number\_of\_policy\_jsons | Number of policies JSON to attach to IAM role |`number`|`0`| no |
173
-
| policies | List of policy statements ARN to attach to IAM role |`list(string)`|`[]`| no |
174
-
| policy | An additional policy document ARN to attach to IAM role |`string`|`null`| no |
175
-
| policy\_json | An additional policy document as JSON to attach to IAM role |`string`|`null`| no |
176
-
| policy\_jsons | List of additional policy documents as JSON to attach to IAM role |`list(string)`|`[]`| no |
177
-
| policy\_statements | Map of dynamic policy statements to attach to IAM role |`any`|`{}`| no |
178
-
| role\_arn | The Amazon Resource Name (ARN) of the IAM role to use for this Step Function |`string`|`""`| no |
179
-
| role\_description | Description of IAM role to use for Step Function |`string`|`null`| no |
180
-
| role\_force\_detach\_policies | Specifies to force detaching any policies the IAM role has before destroying it. |`bool`|`true`| no |
181
-
| role\_name | Name of IAM role to use for Step Function |`string`|`null`| no |
182
-
| role\_path | Path of IAM role to use for Step Function |`string`|`null`| no |
183
-
| role\_permissions\_boundary | The ARN of the policy that is used to set the permissions boundary for the IAM role used by Step Function |`string`|`null`| no |
184
-
| role\_tags | A map of tags to assign to IAM role |`map(string)`|`{}`| no |
185
-
| service\_integrations | Map of AWS service integrations to allow in IAM role policy |`any`|`{}`| no |
186
-
| tags | Maps of tags to assign to the Step Function |`map(string)`|`{}`| no |
187
-
| trusted\_entities | Step Function additional trusted entities for assuming roles (trust relationship) |`list(string)`|`[]`| no |
188
-
| type | Determines whether a Standard or Express state machine is created. The default is STANDARD. Valid Values: STANDARD \| EXPRESS |`string`|`"STANDARD"`| no |
189
-
| use\_existing\_role | Whether to use an existing IAM role for this Step Function |`bool`|`false`| no |
169
+
|<aname="input_attach_policies"></a> [attach\_policies](#input\_attach\_policies)| Controls whether list of policies should be added to IAM role |`bool`|`false`| no |
170
+
|<aname="input_attach_policies_for_integrations"></a> [attach\_policies\_for\_integrations](#input\_attach\_policies\_for\_integrations)| Whether to attach AWS Service policies to IAM role |`bool`|`true`| no |
171
+
|<aname="input_attach_policy"></a> [attach\_policy](#input\_attach\_policy)| Controls whether policy should be added to IAM role |`bool`|`false`| no |
172
+
|<aname="input_attach_policy_json"></a> [attach\_policy\_json](#input\_attach\_policy\_json)| Controls whether policy\_json should be added to IAM role |`bool`|`false`| no |
173
+
|<aname="input_attach_policy_jsons"></a> [attach\_policy\_jsons](#input\_attach\_policy\_jsons)| Controls whether policy\_jsons should be added to IAM role |`bool`|`false`| no |
174
+
|<aname="input_attach_policy_statements"></a> [attach\_policy\_statements](#input\_attach\_policy\_statements)| Controls whether policy\_statements should be added to IAM role |`bool`|`false`| no |
175
+
|<aname="input_aws_region_assume_role"></a> [aws\_region\_assume\_role](#input\_aws\_region\_assume\_role)| Name of AWS regions where IAM role can be assumed by the Step Function |`string`|`""`| no |
176
+
|<aname="input_create"></a> [create](#input\_create)| Whether to create Step Function resource |`bool`|`true`| no |
177
+
|<aname="input_create_role"></a> [create\_role](#input\_create\_role)| Whether to create IAM role for the Step Function |`bool`|`true`| no |
178
+
|<aname="input_definition"></a> [definition](#input\_definition)| The Amazon States Language definition of the Step Function |`string`|`""`| no |
179
+
|<aname="input_name"></a> [name](#input\_name)| The name of the Step Function |`string`|`""`| no |
180
+
|<aname="input_number_of_policies"></a> [number\_of\_policies](#input\_number\_of\_policies)| Number of policies to attach to IAM role |`number`|`0`| no |
181
+
|<aname="input_number_of_policy_jsons"></a> [number\_of\_policy\_jsons](#input\_number\_of\_policy\_jsons)| Number of policies JSON to attach to IAM role |`number`|`0`| no |
182
+
|<aname="input_policies"></a> [policies](#input\_policies)| List of policy statements ARN to attach to IAM role |`list(string)`|`[]`| no |
183
+
|<aname="input_policy"></a> [policy](#input\_policy)| An additional policy document ARN to attach to IAM role |`string`|`null`| no |
184
+
|<aname="input_policy_json"></a> [policy\_json](#input\_policy\_json)| An additional policy document as JSON to attach to IAM role |`string`|`null`| no |
185
+
|<aname="input_policy_jsons"></a> [policy\_jsons](#input\_policy\_jsons)| List of additional policy documents as JSON to attach to IAM role |`list(string)`|`[]`| no |
186
+
|<aname="input_policy_statements"></a> [policy\_statements](#input\_policy\_statements)| Map of dynamic policy statements to attach to IAM role |`any`|`{}`| no |
187
+
|<aname="input_role_arn"></a> [role\_arn](#input\_role\_arn)| The Amazon Resource Name (ARN) of the IAM role to use for this Step Function |`string`|`""`| no |
188
+
|<aname="input_role_description"></a> [role\_description](#input\_role\_description)| Description of IAM role to use for Step Function |`string`|`null`| no |
189
+
|<aname="input_role_force_detach_policies"></a> [role\_force\_detach\_policies](#input\_role\_force\_detach\_policies)| Specifies to force detaching any policies the IAM role has before destroying it. |`bool`|`true`| no |
190
+
|<aname="input_role_name"></a> [role\_name](#input\_role\_name)| Name of IAM role to use for Step Function |`string`|`null`| no |
191
+
|<aname="input_role_path"></a> [role\_path](#input\_role\_path)| Path of IAM role to use for Step Function |`string`|`null`| no |
192
+
|<aname="input_role_permissions_boundary"></a> [role\_permissions\_boundary](#input\_role\_permissions\_boundary)| The ARN of the policy that is used to set the permissions boundary for the IAM role used by Step Function |`string`|`null`| no |
193
+
|<aname="input_role_tags"></a> [role\_tags](#input\_role\_tags)| A map of tags to assign to IAM role |`map(string)`|`{}`| no |
194
+
|<aname="input_service_integrations"></a> [service\_integrations](#input\_service\_integrations)| Map of AWS service integrations to allow in IAM role policy |`any`|`{}`| no |
195
+
|<aname="input_tags"></a> [tags](#input\_tags)| Maps of tags to assign to the Step Function |`map(string)`|`{}`| no |
196
+
|<aname="input_trusted_entities"></a> [trusted\_entities](#input\_trusted\_entities)| Step Function additional trusted entities for assuming roles (trust relationship) |`list(string)`|`[]`| no |
197
+
|<aname="input_type"></a> [type](#input\_type)| Determines whether a Standard or Express state machine is created. The default is STANDARD. Valid Values: STANDARD \| EXPRESS |`string`|`"STANDARD"`| no |
198
+
|<aname="input_use_existing_role"></a> [use\_existing\_role](#input\_use\_existing\_role)| Whether to use an existing IAM role for this Step Function |`bool`|`false`| no |
190
199
191
200
## Outputs
192
201
193
202
| Name | Description |
194
203
|------|-------------|
195
-
| this\_role\_arn | The ARN of the IAM role created for the Step Function |
196
-
| this\_role\_name | The name of the IAM role created for the Step Function |
197
-
| this\_state\_machine\_arn | The ARN of the Step Function |
198
-
| this\_state\_machine\_creation\_date | The date the Step Function was created |
199
-
| this\_state\_machine\_id | The ARN of the Step Function |
200
-
| this\_state\_machine\_status | The current status of the Step Function |
204
+
|<aname="output_this_role_arn"></a> [this\_role\_arn](#output\_this\_role\_arn)| The ARN of the IAM role created for the Step Function |
205
+
|<aname="output_this_role_name"></a> [this\_role\_name](#output\_this\_role\_name)| The name of the IAM role created for the Step Function |
206
+
|<aname="output_this_state_machine_arn"></a> [this\_state\_machine\_arn](#output\_this\_state\_machine\_arn)| The ARN of the Step Function |
207
+
|<aname="output_this_state_machine_creation_date"></a> [this\_state\_machine\_creation\_date](#output\_this\_state\_machine\_creation\_date)| The date the Step Function was created |
208
+
|<aname="output_this_state_machine_id"></a> [this\_state\_machine\_id](#output\_this\_state\_machine\_id)| The ARN of the Step Function |
209
+
|<aname="output_this_state_machine_status"></a> [this\_state\_machine\_status](#output\_this\_state\_machine\_status)| The current status of the Step Function |
| this\_role\_arn | The ARN of the IAM role created for the State Machine |
59
-
| this\_role\_name | The name of the IAM role created for the State Machine |
60
-
| this\_state\_machine\_arn | The ARN of the State Machine |
61
-
| this\_state\_machine\_creation\_date | The date the State Machine was created |
62
-
| this\_state\_machine\_id | The ARN of the State Machine |
63
-
| this\_state\_machine\_status | The current status of the State Machine |
58
+
|<aname="output_this_role_arn"></a> [this\_role\_arn](#output\_this\_role\_arn)| The ARN of the IAM role created for the State Machine |
59
+
|<aname="output_this_role_name"></a> [this\_role\_name](#output\_this\_role\_name)| The name of the IAM role created for the State Machine |
60
+
|<aname="output_this_state_machine_arn"></a> [this\_state\_machine\_arn](#output\_this\_state\_machine\_arn)| The ARN of the State Machine |
61
+
|<aname="output_this_state_machine_creation_date"></a> [this\_state\_machine\_creation\_date](#output\_this\_state\_machine\_creation\_date)| The date the State Machine was created |
62
+
|<aname="output_this_state_machine_id"></a> [this\_state\_machine\_id](#output\_this\_state\_machine\_id)| The ARN of the State Machine |
63
+
|<aname="output_this_state_machine_status"></a> [this\_state\_machine\_status](#output\_this\_state\_machine\_status)| The current status of the State Machine |
0 commit comments